While you have been distracted by political squabbling about Iran, Russian state sponsored cyber
crime organizations have been attacking home Internet routers, gaining access to and redirecting Internet DNS requests through their global web of hosting services.
APT28 exploit routers to enable DNS hijacking operations
Russian cyber actor APT28 exploit vulnerable routers to hijack DNS, enabling adversary‑in‑the‑middle attacks and theft of passwords and authentication tokens.

Russian cyber actors APT28 have been exploiting routers to overwrite Dynamic Host Configuration Protocol (DHCP)/Domain Name System (DNS) settings to redirect traffic through attacker-controlled DNS servers. Resulting malicious DNS resolutions enable adversary-in-the-middle (AitM) attacks that harvest passwords, OAuth tokens and other credentials for web and email related services. This puts organisations at risk of credential theft, data manipulation and broader compromise.
The DNS hijacking operations are believed to be opportunistic in nature, with the actor targeting a wide pool of victims and then likely filtering down for users of potential intelligence value at each stage of the exploitation chain. -
National Cyber Security Centre - UK
Mitigation
* - Never allow your Internet router management interface to be accessible from its WAN port, only the LAN port.
* - Update your router's firmware or retire
SoHo equipment that is no longer supported.
* - Update and patch equipment operating systems and software.
* - Whenever possible, take advantage of two-factor/multi-factor authentication for Web sites you use.
Updating your home router's firmware is fairly simple. Use a PC or a specific cellphone APP to accomplish this operation. If you can login to your router's management interface (like https:
192.168.1.1), there will be an administrative area where you can update the router directly. If not, find the make/model of your router, go to the manufacturer's Support Web site, find your model and it's current firmware update, download the update and follow the online Support instructions on how to best update your SoHo router.
TP-Link routers, specifically, are currently being targeted.
Interestingly, I did additional Geo-lookups on the DNS servers the article shows are perpetrating traffic redirection (see article above) and there was a recurring pattern. On a technical level, there were a handful of ISPs the Russian's were coordinating with.
Hydra Communications - AS25369 out of the UK
LeaseWeb - AS59253 & AS396362 out of Singapore and NY, USA
HZ Hosting - AS202015 & AS59711 out of Bulgaria, Sweden, and TX, USA
EstNOC - AS206804 out of Estonia and Poland
but also,
Nexeon Tech - AS20278 TX, USA
Alexhost - AS200019 Bulgaria
Belcloud - AS44901 Bulgaria
Zubritska - AS207560 Kyiv, Ukraine